Hey 👋
This is Max’s (aka w2w) blog dedicated to security research and white hat hacking
‎
This post describes two account takeover vulnerabilities w/o user interaction resulting from multiple omissions in the OTP implementations.
This post contains 11 methods of MFA bypassing
A guide on how to exploit Cookie-Based XSS bugs
‎
A tale of 7 vulnerabilities on services related to the cryptocurrency